Book · April 8, 2022
Based on curricula developed by the authors at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating both targeted and opportunistic ... ...
Cite
Book · April 5, 2018
And the new topic of exploiting the Internet of things is introduced in this edition. •Build and launch spoofing exploits with Ettercap •Induce error conditions and crash software using fuzzers •Use advanced reverse engineering to ... ...
Cite
Book · September 3, 2016
This completely updated edition focuses on an expanded discussion on the use of Powershell, and includes practical updates to all tools and coverage. ...
Cite
Book · January 9, 2015
Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to ... ...
Cite
Chapter · March 24, 2014
This comprehensive guide will show you exactly how hackers target browsers and exploit their weaknesses to establish a beachhead and launch attacks deep into your network. Fight back with The Browser Hacker’s Handbook. ...
Cite
Book · November 4, 2011
This book is divided into 10 chapters that explores topics such as command shell scripting; Python, Perl, and Ruby; Web scripting with PHP; manipulating Windows with PowerShell; scanner scripting; information gathering; exploitation ... ...
Cite